Volume 27,Issue 6,2016 Table of Contents
云计算安全研究专刊前言薛锐,任奎,张玉清,李晖,刘吉强,赵波,祝烈煌2016,27(6):1325-1327 [Abstract(5956)] [View PDF(6898)256.49 K]Survey on Cloud Computing SecurityZHANG Yu-Qing, WANG Xiao-Fei, LIU Xue-Feng and LIU Ling2016,27(6):1328-1348 [Abstract(8511)] [View PDF(13791)816.86 K]Model Constructing Method for Analyzing the Trusty of CloudZHAO Bo, DAI Zhong-Hua, XIANG Shuang and TAO Wei2016,27(6):1349-1365 [Abstract(5456)] [View PDF(7243)839.78 K]Secure Access Scheme of Cloud Services for Trusted Mobile Terminals using TrustZoneYANG Bo, FENG Deng-Guo, QIN Yu and ZHANG Ying-Jun2016,27(6):1366-1383 [Abstract(5800)] [View PDF(9341)854.90 K]Research and Application Progress of Virtual Machine Introspection TechnologyLI Bao-Hui, XU Ke-Fu, ZHANG Peng, GUO Li, HU Yue and FANG Bin-Xing2016,27(6):1384-1401 [Abstract(6090)] [View PDF(9409)513.10 K]Security Protection Model on Live Migration for KVM VirtualizationFAN Wei, KONG Bin, ZHANG Zhu-Jun, WANG Ting-Ting, ZHANG Jie and HUANG Wei-Qing2016,27(6):1402-1416 [Abstract(5754)] [View PDF(7927)804.55 K]Group Provable Data Possession with Deduplication in Cloud StorageWANG Hong-Yuan, ZHU Lie-Huang and LI Long-Yi-Jia2016,27(6):1417-1431 [Abstract(5087)] [View PDF(6852)555.81 K]Enforcing Access Controls on Encrypted Cloud Storage with Policy HidingLEI Lei, CAI Quan-Wei, JING Ji-Wu, LIN Jing-Qiang, WANG Zhan and CHEN Bo2016,27(6):1432-1450 [Abstract(6580)] [View PDF(7834)674.52 K]Cloud Storage Integrity Checking Scheme with Private Key Recovery CapabilitySHEN Wen-Ting, YU Jia, YANG Guang-Yang, CHENG Xiang-Guo and HAO Rong2016,27(6):1451-1462 [Abstract(5222)] [View PDF(6407)812.42 K]Secure Cloud Storage Model Based on Threshold Public Key Encryption and Erasure Codes over ExponentsXU Jian, LI Jian, HAN Jian, LI Fu-Xiang and ZHOU Fu-Cai2016,27(6):1463-1474 [Abstract(4951)] [View PDF(6529)1.30 M]Multi-User Binary Tree Based ORAM SchemeSUN Xiao-Ni, JIANG Han and XU Qiu-Liang2016,27(6):1475-1486 [Abstract(5641)] [View PDF(6395)420.63 K]Identity-Based Fully Homomorphic Encryption from EigenvectorKANG Yuan-Ji, GU Chun-Xiang, ZHENG Yong-Hui and GUANG Yan2016,27(6):1487-1497 [Abstract(5815)] [View PDF(7430)371.92 K]Key-Policy Attribute-Based Encryption Scheme for General CircuitsHU Peng and GAO Hai-Ying2016,27(6):1498-1510 [Abstract(4637)] [View PDF(5975)522.13 K]Privacy-Preserving Multi-Factor Key Exchange Protocol in the Standard ModelWEI Fu-Shan, ZHANG Gang, MA Jian-Feng and MA Chuan-Gui2016,27(6):1511-1522 [Abstract(4889)] [View PDF(6426)445.30 K]ID Authentication Scheme Based on PTPM and Certificateless Public Key Cryptography in Cloud EnvironmentWANG Zhong-Hua, HAN Zhen, LIU Ji-Qiang, ZHANG Da-Wei and CHANG Liang2016,27(6):1523-1537 [Abstract(5349)] [View PDF(6625)1.04 M]Trusted Cloud Tenant Separation Mechanism Supporting TransparencySHI Yong, GUO Yu, LIU Ji-Qiang, HAN Zhen, MA Wei and CHANG Liang2016,27(6):1538-1548 [Abstract(5225)] [View PDF(6220)382.98 K]Secure Set Computing in Cloud EnvironmentLI Shun-Dong, ZHOU Su-Fang, GUO Yi-Min, DOU Jia-Wei and WANG Dao-Shun2016,27(6):1549-1565 [Abstract(5666)] [View PDF(7077)421.54 K]Efficient Ciphertext Search Method Based on Similarity Search TreeTIAN Xue, ZHU Xiao-Jie, SHEN Pei-Song, CHEN Chi and ZOU Hong2016,27(6):1566-1576 [Abstract(5419)] [View PDF(7258)473.04 K]Efficient Conjunctive Keyword Search over Encrypted Electronic Medical RecordsZHANG Li-Li, ZHANG Yu-Qing, LIU Xue-Feng and QUAN Han-Yu2016,27(6):1577-1591 [Abstract(5470)] [View PDF(6731)499.12 K]Reversible Data Hiding in Encrypted Image Based on Homomorphic Public Key CryptosystemXIANG Shi-Jun and LUO Xin-Rong2016,27(6):1592-1601 [Abstract(6186)] [View PDF(6999)569.70 K]